Why apps only build on Android 11 - java

I made an android app. The test was done with android version 9 and android version 11 devices.
But it works fine on android 11 version, but gives an error on android 9 version. I tried looking for information but couldn't find it. Thanks for your help.
Android 9 Error Code:
Build fingerprint: 'samsung/dreamlteks/dreamlteks:9/PPR1.180610.011/G950NKSU4DTD1:user/release-keys'
Revision: '11'
ABI: 'arm64'
pid: 14715, tid: 14715, name: mobile_20220531 >>> package_name <<<
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
Cause: null pointer dereference
x0 0000000000000000 x1 000000000000000d x2 756f43656c69466e x3 6f6300203a20746e
x4 0000000000000028 x5 0000800000000000 x6 6e61ff1f391f736d x7 7f7f7f7f7f7f7f7f
x8 0000000000000000 x9 ffffffffffffffff x10 0000007d5b9d99d0 x11 ffffffffffffffff
x12 ffffffffffffffff x13 0000000000000001 x14 0000007dfb17d000 x15 ffffffffffffffff
x16 0000007d5b9a3910 x17 0000007d5b92b824 x18 0000000000000000 x19 0000007d74c14c00
x20 0000000000000000 x21 0000007d74c14c00 x22 0000007fc24b7340 x23 0000007d5e2f242d
x24 000000000000000c x25 0000007dfb6c35f8 x26 0000007d74c14ca0 x27 0000000000000003
x28 0000007fc24b7070 x29 0000007fc24b6b90
sp 0000007fc24b6b80 lr 0000007d5b92a6a4 pc 0000007d5b92b83c
Error Source:
ptr_entry_info = (st_entrymodel_info *)malloc(entry_cnt * sizeof(st_entrymodel_info))
More information
backtrace:
#00 pc 00000000000da114 /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk (offset 0x4929000) (_JNIEnv::NewByteArray(int)+24)
#01 pc 00000000000d8f78 /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk (offset 0x4929000) (MainControll::LogStrInt(char*, int, int, int, int, int)+160)
#02 pc 00000000000d8d30 /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk (offset 0x4929000) (Java_com_example_elfscoreprint_1mobile_120220531_MainActivity_GetFileData+640)
#03 pc 000000000056afe0 /system/lib64/libart.so (art_quick_generic_jni_trampoline+144)
#04 pc 0000000000561f88 /system/lib64/libart.so (art_quick_invoke_stub+584)
#05 pc 00000000000d0140 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
#06 pc 00000000002865e8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
#07 pc 00000000002805a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
#08 pc 0000000000531240 /system/lib64/libart.so (MterpInvokeVirtual+584)
#09 pc 0000000000554614 /system/lib64/libart.so (ExecuteMterpImpl+14228)
#10 pc 00000000000604f0 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk_32135_32135 (deleted) (com.example.elfscoreprint_mobile_20220531.MainActivity.a+988)
#11 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#12 pc 000000000025fc20 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
#13 pc 0000000000280588 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
#14 pc 0000000000532580 /system/lib64/libart.so (MterpInvokeDirect+296)
#15 pc 0000000000554714 /system/lib64/libart.so (ExecuteMterpImpl+14484)
#16 pc 00000000000600fc /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk_32135_32135 (deleted) (com.example.elfscoreprint_mobile_20220531.MainActivity.b)
#17 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#18 pc 000000000025fc20 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
#19 pc 0000000000280588 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
#20 pc 0000000000531240 /system/lib64/libart.so (MterpInvokeVirtual+584)
#21 pc 0000000000554614 /system/lib64/libart.so (ExecuteMterpImpl+14228)
#22 pc 000000000005eefc /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk_32135_32135 (deleted) (com.example.elfscoreprint_mobile_20220531.a.onMethodCall+4)
#23 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#24 pc 000000000025fc20 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
#25 pc 0000000000280588 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
#26 pc 00000000005321b8 /system/lib64/libart.so (MterpInvokeInterface+1392)
#27 pc 0000000000554814 /system/lib64/libart.so (ExecuteMterpImpl+14740)
#28 pc 00000000000837c2 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk_32135_32135 (deleted) (io.flutter.plugin.common.MethodChannel$IncomingMethodCallHandler.onMessage+34)
#29 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#30 pc 000000000025fc20 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
#31 pc 0000000000280588 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
#32 pc 00000000005321b8 /system/lib64/libart.so (MterpInvokeInterface+1392)
#33 pc 0000000000554814 /system/lib64/libart.so (ExecuteMterpImpl+14740)
#34 pc 0000000000078760 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk_32135_32135 (deleted) (io.flutter.embedding.engine.dart.DartMessenger.invokeHandler+36)
#35 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#36 pc 0000000000521980 /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
#37 pc 000000000056b0fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
#38 pc 00000000000144d8 /dev/ashmem/dalvik-jit-code-cache_32135_32135 (deleted) (io.flutter.embedding.engine.dart.DartMessenger.a+248)
#39 pc 0000000000561f88 /system/lib64/libart.so (art_quick_invoke_stub+584)
#40 pc 00000000000d0140 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
#41 pc 00000000002865e8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
#42 pc 00000000002816b0 /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+752)
#43 pc 0000000000533db4 /system/lib64/libart.so (MterpInvokeDirectRange+244)
#44 pc 0000000000554a14 /system/lib64/libart.so (ExecuteMterpImpl+15252)
#45 pc 00000000000787c0 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk_32135_32135 (deleted) (io.flutter.embedding.engine.dart.DartMessenger.b)
#46 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#47 pc 000000000025fc20 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
#48 pc 0000000000281694 /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+724)
#49 pc 0000000000532a78 /system/lib64/libart.so (MterpInvokeVirtualRange+576)
#50 pc 0000000000554914 /system/lib64/libart.so (ExecuteMterpImpl+14996)
#51 pc 000000000007787c /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.example.elfscoreprint_mobile_20220531-gO-SIf7DRkP95RhmXzloqg==/base.apk_32135_32135 (deleted) (io.flutter.embedding.engine.dart.c.run+24)
#52 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#53 pc 0000000000521980 /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
#54 pc 000000000056b0fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
#55 pc 00000000000146a0 /dev/ashmem/dalvik-jit-code-cache_32135_32135 (deleted) (android.os.Handler.handleCallback+64)
#56 pc 000000000056224c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
#57 pc 00000000000d0160 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
#58 pc 00000000002865e8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
#59 pc 00000000002805a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
#60 pc 0000000000532744 /system/lib64/libart.so (MterpInvokeStatic+204)
#61 pc 0000000000554794 /system/lib64/libart.so (ExecuteMterpImpl+14612)
#62 pc 0000000000c4e7ac /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+8)
#63 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#64 pc 000000000025fc20 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
#65 pc 0000000000280588 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
#66 pc 0000000000531240 /system/lib64/libart.so (MterpInvokeVirtual+584)
#67 pc 0000000000554614 /system/lib64/libart.so (ExecuteMterpImpl+14228)
#68 pc 0000000000c5741a /system/framework/boot-framework.vdex (android.os.Looper.loop+406)
#69 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#70 pc 000000000025fc20 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
#71 pc 0000000000280588 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
#72 pc 0000000000532744 /system/lib64/libart.so (MterpInvokeStatic+204)
#73 pc 0000000000554794 /system/lib64/libart.so (ExecuteMterpImpl+14612)
#74 pc 00000000004c1330 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+220)
#75 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#76 pc 0000000000521980 /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
#77 pc 000000000056b0fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
#78 pc 000000000056224c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
#79 pc 00000000000d0160 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
#80 pc 00000000004682e0 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
#81 pc 0000000000469d38 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
#82 pc 00000000003f87b8 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+48)
#83 pc 000000000011f7e4 /system/framework/arm64/boot.oat (offset 0x115000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
#84 pc 0000000000561f88 /system/lib64/libart.so (art_quick_invoke_stub+584)
#85 pc 00000000000d0140 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
#86 pc 00000000002865e8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
#87 pc 00000000002805a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
#88 pc 0000000000531240 /system/lib64/libart.so (MterpInvokeVirtual+584)
#89 pc 0000000000554614 /system/lib64/libart.so (ExecuteMterpImpl+14228)
#90 pc 00000000013bd79a /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
#91 pc 000000000025a0a0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2089273699+496)
#92 pc 0000000000521980 /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
#93 pc 000000000056b0fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
#94 pc 0000000000e16700 /system/framework/arm64/boot-framework.oat (offset 0x41f000) (com.android.internal.os.ZygoteInit.main+2208)
#95 pc 000000000056224c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
#96 pc 00000000000d0160 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
#97 pc 00000000004682e0 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
#98 pc 0000000000467f38 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+416)
#99 pc 000000000036ab24 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+644)
#100 pc 00000000000b9d10 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120)
#101 pc 00000000000bc8d4 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+780)
#102 pc 0000000000004990 /system/bin/app_process64 (main+1200)
#103 pc 00000000000b0550 /system/lib64/libc.so (__libc_init+88)
Is there a problem because the version of the platform is 11.0.10 like in the image??

Related

This Error Force close my app when I'm inspecting my table : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x10

I have table in my application and I'm Running my app on Huawei y9 and this error pops up after a 30 sec and force close my application. I link my other question that I put the code of my table btw Im ussing implementation "androidx.room:room-runtime:2.3.0" and
annotationProcessor "androidx.room:room-compiler:2.3.0" but I don't think this casing the error.
my Error :
2022-03-05 20:41:45.893 29390-29425/com.example.myapplication A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x10 in tid 29425 (HeapTaskDaemon), pid 29390 (e.myapplication)
2022-03-05 20:41:46.093 29837-29837/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2022-03-05 20:41:46.094 29837-29837/? A/DEBUG: Build fingerprint: 'HUAWEI/JKM-LX1/HWJKM-H:9/HUAWEIJKM-LX1/9.1.0.309C185:user/release-keys'
2022-03-05 20:41:46.094 29837-29837/? A/DEBUG: Revision: '0'
2022-03-05 20:41:46.094 29837-29837/? A/DEBUG: ABI: 'arm64'
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: Happend: 'Sat Mar 5 20:41:46 2022
'
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: SYSVMTYPE: Art
APPVMTYPE: Art
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: pid: 29390, tid: 29425, name: HeapTaskDaemon >>> com.example.myapplication <<<
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x10
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: Cause: null pointer dereference
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: x0 0000007cd5ef6f00 x1 0000007cb6eede48 x2 0000000000000008 x3 0000000000000400
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: x4 0000000017e08744 x5 0000000013489974 x6 0000000017e1fa50 x7 0000000017e1fa50
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: x8 0000000000000000 x9 fbafe48ae0791bf6 x10 0000000042c00000 x11 0000000000000008
2022-03-05 20:41:46.095 29837-29837/? A/DEBUG: x12 000000000000000b x13 17e053d000000000 x14 0000007cd5ec0d50 x15 00000cefaa754cdb
2022-03-05 20:41:46.096 29837-29837/? A/DEBUG: x16 0000007cd5b95ec0 x17 0000007d5909fdf0 x18 0000007cd5abea50 x19 0000007cb6eede48
2022-03-05 20:41:46.096 29837-29837/? A/DEBUG: x20 0000000070c0d868 x21 0000000000000008 x22 00000000714d2528 x23 00000000714d10b0
2022-03-05 20:41:46.096 29837-29837/? A/DEBUG: x24 0000000000000028 x25 00000000000023c8 x26 0000000000001478 x27 0000007cb6eef588
2022-03-05 20:41:46.096 29837-29837/? A/DEBUG: x28 00000000714d10c8 x29 0000007cb6eede30
2022-03-05 20:41:46.096 29837-29837/? A/DEBUG: sp 0000007cb6eeddc0 lr 0000007cd570e08c pc 0000007cd570e068
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: backtrace:
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #00 pc 00000000001d7068 /system/lib64/libart.so (_ZN3art6mirror6Object15VisitReferencesILb1ELNS_17VerifyObjectFlagsE0ELNS_17ReadBarrierOptionE1ENS_2gc9collector17ConcurrentCopying16RefFieldsVisitorES8_EEvRKT2_RKT3_+2504)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #01 pc 00000000001c9594 /system/lib64/libart.so (art::gc::collector::ConcurrentCopying::ImmuneSpaceScanObjVisitor::Callback(art::mirror::Object*, void*)+68)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #02 pc 00000000001bb220 /system/lib64/libart.so (art::gc::accounting::ModUnionTableReferenceCache::VisitObjects(void (*)(art::mirror::Object*, void*), void*)+224)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #03 pc 00000000001c6770 /system/lib64/libart.so (art::gc::collector::ConcurrentCopying::MarkingPhase()+244)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #04 pc 00000000001c51b8 /system/lib64/libart.so (art::gc::collector::ConcurrentCopying::RunPhases()+1176)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #05 pc 00000000001db930 /system/lib64/libart.so (art::gc::collector::GarbageCollector::Run(art::gc::GcCause, bool)+320)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #06 pc 0000000000201860 /system/lib64/libart.so (art::gc::Heap::CollectGarbageInternal(art::gc::collector::GcType, art::gc::GcCause, bool)+3404)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #07 pc 00000000001ff654 /system/lib64/libart.so (art::gc::Heap::DoPendingCollectorTransition()+108)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #08 pc 00000000002185c0 /system/lib64/libart.so (art::gc::Heap::CollectorTransitionTask::Run(art::Thread*)+40)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #09 pc 000000000023ab48 /system/lib64/libart.so (art::gc::TaskProcessor::RunAllTasks(art::Thread*)+68)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #10 pc 0000000000092a6c /system/framework/arm64/boot-core-libart.oat (offset 0x90000) (dalvik.system.VMRuntime.clampGrowthLimit [DEDUPED]+124)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #11 pc 0000000000580588 /system/lib64/libart.so (art_quick_invoke_stub+584)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #12 pc 00000000000d8608 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #13 pc 000000000028cec8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #14 pc 0000000000286ed0 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2022-03-05 20:41:46.151 29837-29837/? A/DEBUG: #15 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #16 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #17 pc 00000000000bbe7e /system/framework/boot-core-libart.vdex (java.lang.Daemons$HeapTaskDaemon.runInternal+38)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #18 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #19 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #20 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #21 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #22 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #23 pc 00000000000bb9b4 /system/framework/boot-core-libart.vdex (java.lang.Daemons$Daemon.run+20)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #24 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #25 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #26 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #27 pc 00000000005489b4 /system/lib64/libart.so (MterpInvokeInterface+944)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #28 pc 0000000000572e94 /system/lib64/libart.so (ExecuteMterpImpl+14740)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #29 pc 00000000000cd1ce /system/framework/boot.vdex (java.lang.Thread.run+12)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #30 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #31 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #32 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #33 pc 0000000000580588 /system/lib64/libart.so (art_quick_invoke_stub+584)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #34 pc 00000000000d8608 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #35 pc 000000000047b3e8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #36 pc 000000000047c4a4 /system/lib64/libart.so (art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue*)+424)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #37 pc 00000000004a8238 /system/lib64/libart.so (art::Thread::CreateCallback(void*)+1120)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #38 pc 0000000000083a6c /system/lib64/libc.so (__pthread_start(void*)+36)
2022-03-05 20:41:46.152 29837-29837/? A/DEBUG: #39 pc 00000000000246e4 /system/lib64/libc.so (__start_thread+68)

Android ImageReader - Invalid format specified 42

I have been working to capture images of the phone screen using ImageReader. The JPEG's I am receiving are not valid. With this setting:
ImageReader mImageReader = ImageReader.newInstance(width, height, ImageFormat.JPEG, 10);
I get this in onImageAvailable:
W/AndroidMediaUtils: Image_getBlobSize: No JPEG/HEIC header detected, defaulting to size=width=2662272
2022-01-26 11:23:36.495 22708-22857/com.artistol.phonekast D/skia: --- Failed to create image decoder with message 'unimplemented'
If I try to extract a bitmap, the bitmap is null:
ByteBuffer myBuffer = image.getPlanes()[0].getBuffer();
myBuffer.rewind();
int mySize = myBuffer.remaining();
frame = new byte[mySize];
myBuffer.get(frame, 0, mySize);
final Bitmap bitmap = BitmapFactory.decodeByteArray(frame, 0, frame.length);
if (bitmap==null)
Log.d(TAG, "bitmap is null");
If I set things such that the height != width, I will see the following exception:
2022-01-26 11:30:29.251 23141-23194/com.name.subname A/AndroidMediaUtils: RGBA override BLOB format buffer should have height == width
2022-01-26 11:30:29.376 23141-23194/com.name.subname A/my_process: runtime.cc:655] Runtime aborting...
runtime.cc:655] Dumping all threads without mutator lock held
runtime.cc:655] All threads:
runtime.cc:655] DALVIK THREADS (27):
runtime.cc:655] "com.name.subname.MyService" prio=5 tid=23 Runnable
runtime.cc:655] | group="" sCount=0 dsCount=0 flags=0 obj=0x12e4cce8 self=0xb40000773250af00
runtime.cc:655] | sysTid=23194 nice=0 cgrp=default sched=0/0 handle=0x75b062bcc0
runtime.cc:655] | state=R schedstat=( 5329217 1502500 2 ) utm=0 stm=0 core=7 HZ=100
runtime.cc:655] | stack=0x75b0528000-0x75b052a000 stackSize=1043KB
runtime.cc:655] | held mutexes= "abort lock" "mutator lock"(shared held)
runtime.cc:655] native: #00 pc 000000000049ee3c /apex/com.android.art/lib64/libart.so (art::DumpNativeStack(std::__1::basic_ostream<char, std::__1::char_traits<char> >&, int, BacktraceMap*, char const*, art::ArtMethod*, void*, bool)+140)
runtime.cc:655] native: #01 pc 00000000005abff8 /apex/com.android.art/lib64/libart.so (art::Thread::DumpStack(std::__1::basic_ostream<char, std::__1::char_traits<char> >&, bool, BacktraceMap*, bool) const+376)
runtime.cc:655] native: #02 pc 00000000005c9130 /apex/com.android.art/lib64/libart.so (art::DumpCheckpoint::Run(art::Thread*)+924)
runtime.cc:655] native: #03 pc 00000000005c3070 /apex/com.android.art/lib64/libart.so (art::ThreadList::RunCheckpoint(art::Closure*, art::Closure*)+528)
runtime.cc:655] native: #04 pc 00000000005c223c /apex/com.android.art/lib64/libart.so (art::ThreadList::Dump(std::__1::basic_ostream<char, std::__1::char_traits<char> >&, bool)+1920)
runtime.cc:655] native: #05 pc 000000000055cec4 /apex/com.android.art/lib64/libart.so (art::Runtime::Abort(char const*)+1864)
runtime.cc:655] native: #06 pc 0000000000013978 /system/lib64/libbase.so (android::base::SetAborter(std::__1::function<void (char const*)>&&)::$_3::__invoke(char const*)+76)
runtime.cc:655] native: #07 pc 0000000000006e18 /system/lib64/liblog.so (__android_log_assert+336)
runtime.cc:655] native: #08 pc 0000000000001644 /system/lib64/libmedia_jni_utils.so (android::getLockedImageInfo(android::CpuConsumer::LockedBuffer*, int, int, unsigned char**, unsigned int*, int*, int*)+1284)
runtime.cc:655] native: #09 pc 000000000003c66c /system/lib64/libmedia_jni.so (Image_createSurfacePlanes(_JNIEnv*, _jobject*, int, int)+616)
runtime.cc:655] at android.media.ImageReader$SurfaceImage.nativeCreatePlanes(Native method)
runtime.cc:655] - locked <0x004f434f> (a android.media.ImageReader$SurfaceImage)
runtime.cc:655] at android.media.ImageReader$SurfaceImage.getPlanes(ImageReader.java:912)
runtime.cc:655] at com.name.subname.MyService.processImage(MyService.java:341)
runtime.cc:655] at com.name.subname.MyService.access$600(MyService.java:60)
runtime.cc:655] at com.name.subname.MyService$2.onImageAvailable(MyService.java:293)
I have spent considerable time looking at this. I have experimented with changing my ImageReader setting to produce formats other than JPEG. Each time I get an exception such as the following when I use ImageFormat.FLEX_RGBA_8888 instead of ImageFormat.JPEG:
java.lang.UnsupportedOperationException: Invalid format specified 42
at android.media.ImageUtils.getNumPlanesForFormat(ImageUtils.java:73)
at android.media.ImageReader.<init>(ImageReader.java:274)
at android.media.ImageReader.newInstance(ImageReader.java:135)
I see that ImageFormat.FLEX_RGBA_8888 is defined as 0x29 (42) in ImageFormat.java. I reviewed ImageUtils.java code I found here:
https://cs.android.com/android/platform/superproject/+/master:frameworks/base/media/java/android/media/ImageUtils.java;l=55;bpv=1;bpt=0
Indeed FLEX_RGBA_8888 is not one of the codes that getNumPlanesForFormat recognizes, so I can see why this is being rejected. I am an Android novice and could be missing the obvious, but why would ImageFormat provide values that are rejected by ImageReader? Put another way, if I enter some of the codes I see as valid in the ImageUtils case statement, such as PixelFormat.RGBA_8888, my code won't even compile. I'm told:
Must be one of: ImageFormat.UNKNOWN, ImageFormat.RGB_565, ImageFormat.YV12, ImageFormat.Y8, ImageFormat.NV16, ImageFormat.NV21, ImageFormat.YUY2, ImageFormat.JPEG, ImageFormat.DEPTH_JPEG, ImageFormat.YUV_420_888, ImageFormat.YUV_422_888, ImageFormat.YUV_444_888, ImageFormat.FLEX_RGB_888, ImageFormat.FLEX_RGBA_8888, ImageFormat.RAW_SENSOR, ImageFormat.RAW_PRIVATE, ImageFormat.RAW10, ImageFormat.RAW12, ImageFormat.DEPTH16, ImageFormat.DEPTH_POINT_CLOUD, ImageFormat.PRIVATE, ImageFormat.HEIC
Here is how I am setting things up:
ImageReader mImageReader = ImageReader.newInstance(width, height, ImageFormat.FLEX_RGBA_8888, 10);
mImageReader.setOnImageAvailableListener(new ImageReader.OnImageAvailableListener() {
#Override
public void onImageAvailable(ImageReader reader) {
processImage(reader);
}
}, mImageReaderCallbackHandler);
MediaProjectionManager mediaProjectionManager = (MediaProjectionManager) getSystemService(MEDIA_PROJECTION_SERVICE);
mMediaProjection = mediaProjectionManager.getMediaProjection(Activity.RESULT_OK, mIntent);
mMediaProjection.registerCallback(mMediaProjectionCallback, mMediaProjectionCallbackHandler);
mVirtualDisplay = mMediaProjection.createVirtualDisplay("ScreenCapture",
width, height, density,
DisplayManager.VIRTUAL_DISPLAY_FLAG_AUTO_MIRROR,
mImageReader.getSurface(), mVirtualDisplayCallback, mVirtualDisplayCallbackHandler);
I am running this as a remote service and have been testing on a Samsung Note 8 and and Pixel 4a, both physical devices.
Edit 1:
In ImageReader's onImageAvailable, I have the following:
private void processImage(ImageReader reader){
byte[] frame;
Image image = reader.acquireLatestImage();
if(image!=null) {
ByteBuffer myBuffer = image.getPlanes()[0].getBuffer();
myBuffer.rewind();
int mySize = myBuffer.remaining();
frame = new byte[mySize];
myBuffer.get(frame, 0, mySize);
final Bitmap bitmap = BitmapFactory.decodeByteArray(frame, 0, frame.length);
if (bitmap==null)
Log.d(TAG, "bitmap is null");
image.close();
}
}

Fatal Signal 11 (SIGSEGV) occurred in Android Studio program

An error occurs at times (more often than not, actually).
A/libc: Fatal signal 11 (SIGSEGV) at 0x830ab2cc (code=1), thread 24294 (Thread-1174)
The code is as follows:
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.displaygraph);
Intent intent = getIntent();
GraphView graph = (GraphView) findViewById(R.id.graph);
series = new LineGraphSeries<DataPoint>();
graph.addSeries(series);
Viewport viewport = graph.getViewport();
viewport.setYAxisBoundsManual(true);
viewport.setXAxisBoundsManual(true);
viewport.setMinY(0);
double max=data[0];
for (int i = 0; i < data.length; i++) {
if (data[i] > max) {
max = data[i];
Log.w(TAG,"max"+max);
}
}
viewport.setMaxY(max);
viewport.setMinX(0);
viewport.setMaxX(450);
graph.getViewport().setScalable(true);
graph.getViewport().setScalableY(true);
seriesecg = new LineGraphSeries<DataPoint>();
GraphView graphecg = (GraphView) findViewById(R.id.graphecg);
graphecg.addSeries(seriesecg);
Viewport viewportecg = graphecg.getViewport();
viewportecg.setYAxisBoundsManual(true);
viewportecg.setXAxisBoundsManual(true);
viewportecg.setMinY(0);
viewportecg.setMaxY(3000);
viewportecg.setMinX(0);
viewportecg.setMaxX(450);
graphecg.getViewport().setScalable(true);
graphecg.getViewport().setScalableY(true);
}
#Override
protected void onResume() {
super.onResume();
new Thread(new Runnable() {
#Override
public void run() {
// we add 450 new entries
for (int i = 0; i <= 449; i++) {
final int finalI = i;
final int finalII = i;
Log.w(TAG, "finalI"+finalI);
runOnUiThread(new Runnable() {
#Override
public void run() {
addEntry(finalI,ppg);
}
});
// sleep to slow down the add of entries
try {
Thread.sleep(100);
} catch (InterruptedException e) {
// manage error ...
}
}
}
}).start();
}
// add random data to graph
private void addEntry(int i,double[] data) {
if(i<=449) {
Log.w(TAG, "ppg" + data[i]+"/"+i);
series.appendData(new DataPoint(i, data[i]), false, 450);
}
}
The logcat is as follows:
01-22 19:27:01.650 1041-1370/? I/KeyguardUpdateMonitor: visibility is same
01-22 19:27:01.650 818-818/? D/CrashAnrDetector: Build: samsung/lt03ltezs/lt03lte:4.4.2/KOT49H/P605ZSUCOD1:user/release-keys
Hardware: MSM8974
Revision: 11
Bootloader: P605ZSUCOD1
Radio: unknown
Kernel: Linux version 3.4.0-4665213 (dpi#SWDD5621) (gcc version 4.7 (GCC) ) #1 SMP PREEMPT Mon Apr 13 11:19:19 KST 2015
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'samsung/lt03ltezs/lt03lte:4.4.2/KOT49H/P605ZSUCOD1:user/release-keys'
Revision: '11'
pid: 12476, tid: 12476, name: elerometergraph >>> com.android.accelerometergraph <<<
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 82f5583c
r0 402aaedb r1 82f55838 r2 402aaed8 r3 42caa968
r4 bedfd1b8 r5 42277008 r6 bedfd20c r7 402aaaa8
r8 00000000 r9 42caad98 sl 416b049c fp 80000000
ip 00000003 sp bedfd010 lr 4172ff51 pc 4172ff3e cpsr 900f0030
d0 0080000000001000 d1 0200000000004000
d2 0000000000000008 d3 0000888800000000
d4 0000004080000000 d5 0000200000000000
d6 1000000000200000 d7 0000800000000010
d8 44618b1844624bf2 d9 3e99999a4040da00
d10 43380000c3892666 d11 c389266644618b18
d12 4252ccd044624bf2 d13 c07124cccccccccd
d14 4034000000000000 d15 43a38000c3892666
d16 0100000000000000 d17 0004400000020000
d18 0004400000000000 d19 2000010000440000
d20 000a402000088100 d21 0000000000044000
d22 0022000000008800 d23 1100000000000000
d24 3fd1b10853a79915 d25 3fd554fa9ca0567a
d26 3fdb6db71408e660 d27 3fe33333332d4313
d28 3ff0000000000000 d29 0000000000000001
d30 4059000000000000 d31 4024000000000000
scr 20000013
backtrace:
#00 pc 00075f3e /system/lib/libdvm.so (mspace_bulk_free+89)
#01 pc 00076e63 /system/lib/libdvm.so (dvmHeapSourceFreeList(unsigned int, void**)+70)
#02 pc 0003a7b4 /system/lib/libdvm.so
#03 pc 0002c4ec /system/lib/libdvm.so (dvmHeapBitmapSweepWalk(HeapBitmap const*, HeapBitmap const*, unsigned int, unsigned int, void (*)(unsigned int, void**, void*), void*)+176)
#04 pc 0003b53c /system/lib/libdvm.so (dvmHeapSweepUnmarkedObjects(bool, bool, unsigned int*, unsigned int*)+284)
#05 pc 0002c94c /system/lib/libdvm.so (dvmCollectGarbageInternal(GcSpec const*)+452)
#06 pc 0002d45c /system/lib/libdvm.so (dvmMalloc(unsigned int, int)+356)
#07 pc 0006cb03 /system/lib/libdvm.so
#08 pc 0002c36f /dev/ashmem/dalvik-jit-code-cache (deleted)
stack:
bedfcfd0 bedfd1ec [stack]
bedfcfd4 40129d5d /system/lib/libc.so (realloc+12)
bedfcfd8 00000008
bedfcfdc bedfd2a8 [stack]
bedfcfe0 78e476f8
bedfcfe4 00000000
bedfcfe8 00000003
bedfcfec bedfd100 [stack]
bedfcff0 42ca9b88 /dev/ashmem/dalvik-heap (deleted)
bedfcff4 bedfd174 [stack]
bedfcff8 42277008 /dev/ashmem/dalvik-heap (deleted)
bedfcffc bedfd20c [stack]
bedfd000 42caa968 /dev/ashmem/dalvik-heap (deleted)
bedfd004 00000000
bedfd008 42caa950 /dev/ashmem/dalvik-heap (deleted)
bedfd00c 4172ff51 /system/lib/libdvm.so (mspace_bulk_free+108)
#00 bedfd010 00029864
bedfd014 416b0438
bedfd018 00000065
bedfd01c 00000065
bedfd020 bedfd078 [stack]
bedfd024 416b0438
bedfd028 42277008 /dev/ashmem/dalvik-heap (deleted)
bedfd02c 41730e67 /system/lib/libdvm.so (dvmHeapSourceFreeList(unsigned int, void**)+74)
#01 bedfd030 00000065
bedfd034 402abf98 /system/lib/libandroidfw.so
bedfd038 bedfd2cc [stack]
bedfd03c bedfd2cc [stack]
bedfd040 00000065
bedfd044 61fff040 /dev/ashmem/dalvik-bitmap-2 (deleted)
bedfd048 617ff040 /dev/ashmem/dalvik-bitmap-1 (deleted)
bedfd04c 0001acbf
bedfd050 bedfd078 [stack]
bedfd054 416f47b8 /system/lib/libdvm.so
#02 bedfd058 00000000
bedfd05c 00000000
bedfd060 00000030
bedfd064 00015010
bedfd068 01501
01-22 19:27:01.650 818-818/? D/CrashAnrDetector: processName:com.android.accelerometergraph
01-22 19:27:01.650 818-818/? D/CrashAnrDetector: broadcastEvent : com.android.accelerometergraph SYSTEM_TOMBSTONE
01-22 19:27:01.660 1041-1055/? D/KeyguardUpdateMonitor: sendKeyguardVisibilityChanged(true)
01-22 19:27:01.660 1041-1055/? I/KeyguardUpdateMonitor: visibility is same
Sometimes the code works but sometimes it doesn't... but when it occurs, it does so before the value of i reaches 449. I thought it had something to do with my jni code. but after commenting and deleting everything that would call a c code, the error still occurred.
Thank you for your help...

Android explictly free memory without calling System.GC

I have an Android App, in which I have below class containing fields of both native (C++) objects wrapped with JNI, and other java objects:
class MyClass
{
Node nativeNode; // containing Native objects wrapped using NDK and JNI
long otherVars; // some java instances
public void dispose()
{
freeNativeNode();
}
}
In my app, I continuously create instances of MyClass:
for(int i=0;i<1000;i++)
{
MyClass obj = new MyClass();
...
obj.freeNativeNode(); // Here, free native resources (A)
//System.gc(); // Here explicitly collect memory (B)
}
The app crashes when i is bigger than some number, e.g. when i>400 or i>450.
Since I have freed the native memory explicitly as in line (A) above, so I think there should be no memory leak, and java shall use garbage collection to revoke the memory. But the app crashes, and I suspect it might be a memory leak problem.
As I know, it is possible to free the managed memory in Java by calling:
System.GC();
I tried to call this in (B) above, however, the app crashes more often, and say when i > 60, it already crashes.
My questions are:
[1] Should I call System.GC() explicitly? As many have different opinions on calling this ourselves, and some say this is not a good practice.
[2] How do I elegantly free the memory in the loop to avoid crash?
Edit: I understand it is less appropriate to print full log here, but it might be useful to get the whole picture for troubleshooting the problem.
From the log, it seems to be not a memory leak problem, but one of my colleague believes so, and I have no strong evidence showing this is NOT, :)
The tombstone log: debuggerd: 2014-05-01 23:56:47
Build fingerprint: 'htc_asia_hk/endeavoru/endeavoru:4.1.1/JRO03C/128187.28:user/release-keys'
pid: 31725, tid: 31725, name: com.cityu.scm >>> com.cityu.scm <<<
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 00000003
r0 000ff7ff r1 ffffffff r2 00000000 r3 ffffffff
r4 00000110 r5 553b36f8 r6 00000008 r7 00000000
r8 00000000 r9 48ce1c44 sl 40c5b020 fp bec7761c
ip 00000110 sp bec76db0 lr 400491b7 pc 400497b6 cpsr a0000030
d0 0000000000000008 d1 3ddb7cdfd9d7bdbb
d2 3fece61cf8e1788d d3 4435800000000000
d4 000002d0000002d6 d5 0000000042000000
d6 44340000435f0000 d7 0000000040000000
d8 00000000440a8000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 0000000000000000 d17 0000000000000001
d18 0000000000000000 d19 3ff0000000000000
d20 0000000000000000 d21 0000000000000000
d22 0000000000000000 d23 0000000000000000
d24 3ff0000000000000 d25 3ff0000000000000
d26 0000000000000000 d27 c053000000000000
d28 0000000000000006 d29 3ff0000000000000
d30 3ff0000000000000 d31 3ff0000000000000
scr 20000011
backtrace:
#00 pc 000147b6 /system/lib/libc.so (dlmalloc+1589)
#01 pc 00017123 /system/lib/libc.so (malloc+10)
#02 pc 003774fc /data/data/com.cityu.scm/lib/libjniosg.so (operator new(unsigned int)+24)
stack:
bec76d70 5516df70
bec76d74 bec77608 [stack]
bec76d78 48ce1c44
bec76d7c 40c5b020
bec76d80 c0000000
bec76d84 0000001b
bec76d88 0000000e
bec76d8c 003ef75c
bec76d90 0000000e
bec76d94 bec77310 [stack]
bec76d98 c0000000
bec76d9c 00000108
bec76da0 00000000
bec76da4 003ef75c
bec76da8 df0027ad
bec76dac 00000000
#00 bec76db0 524af370
bec76db4 53dc0677 /data/data/com.cityu.scm/lib/libjniosg.so
bec76db8 00000000
bec76dbc 53dc0b15 /data/data/com.cityu.scm/lib/libjniosg.so
(std::_Rb_tree >, std::_Select1st > >, std::less, std::allocator > > >::find(std::string const&)+58)
bec76dc0 00000000
bec76dc4 00000108
bec76dc8 524af160
bec76dcc 003ef75c
bec76dd0 00000164
bec76dd4 bec77608 [stack]
bec76dd8 48ce1c44
bec76ddc 40c5b020
bec76de0 bec7761c [stack]
bec76de4 4004c125 /system/lib/libc.so (malloc+12)
#01 bec76de8 53cbd8ad /data/data/com.cityu.scm/lib/libjniosg.so
bec76dec 53c09500 /data/data/com.cityu.scm/lib/libjniosg.so (operator new(unsigned int)+28)
#02 bec76df0 00000000
bec76df4 524af160
bec76df8 bec7724c [stack]
bec76dfc 53cbd8b7 /data/data/com.cityu.scm/lib/libjniosg.so
bec76e00 00000000
bec76e04 53dc5af9 /data/data/com.cityu.scm/lib/libjniosg.so
(osgDB::InputStream::readObjectFields(std::string const&, unsigned int, osg::Object*)+80)
bec76e08 bec76e34 [stack]
bec76e0c 00000009
bec76e10 bec7724c [stack]
bec76e14 53c1a70b /data/data/com.cityu.scm/lib/libjniosg.so
(BinaryInputIterator::readUInt(unsigned int&)+14)
bec76e18 bec7724c [stack]
bec76e1c bec77288 [stack]
bec76e20 bec7724c [stack]
bec76e24 bec7724c [stack]
bec76e28 00000000
bec76e2c 53dc5c53 /data/data/com.cityu.scm/lib/libjniosg.so
(osgDB::InputStream::readObject(osg::Object*)+114)
memory near r0:
000ff7dc ffffffff ffffffff ffffffff ffffffff ................
000ff7ec ffffffff ffffffff ffffffff ffffffff ................
000ff7fc ffffffff ffffffff ffffffff ffffffff ................
000ff80c ffffffff ffffffff ffffffff ffffffff ................
000ff81c ffffffff ffffffff ffffffff ffffffff ................
memory near r5:
553b36d8 00000000 00000000 53ffa940 553b3701 ........#..S.7;U
553b36e8 00000000 00000000 00000000 00000000 ................
553b36f8 00000000 00000111 553b15f0 553b0b68 ..........;Uh.;U
553b3708 ffffffff 00000000 524133b8 00000000 .........3AR....
553b3718 00000020 000000f1 552da1d0 552fd620 .........-U ./U
memory near r9:
48ce1c24 4cdbee30 4bc88be8 00000006 48ce1c5c 0..L...K....\..H
48ce1c34 5270279c 4bff8370 00000006 00000000 .'pRp..K........
48ce1c44 4390001d 48ce1c84 526f0310 4bff83a8 ...C...H..oR...K
48ce1c54 5270279c 00000000 48ce1c84 526f0308 .'pR.......H..oR
48ce1c64 4bc81c28 00000006 410ace98 48ce1cbc (..K.......A...H
memory near sl:
40c5b000 00000000 00000000 00000000 00000453 ............S...
40c5b010 4cd06328 48ce1c44 4bff83a8 52486000 (c.LD..H...K.`HR
40c5b020 8b300dd1 00001d30 bec77730 00000000 ..0.0...0w......
40c5b030 bec77764 00000001 00000000 40791380 dw............y#
40c5b040 00000000 00000000 402e0570 48cdc300 ........p..#...H
memory near fp:
bec775fc 54f4c024 4bff8370 407911f4 48ce1c44 $..Tp..K..y#D..H
bec7760c 00000001 4119d1f8 52722f8f 0000003b .......A./rR;...
bec7761c 407c3c87 48ce1c44 52722f8d 53bc6a01 .<|#D..H./rR.j.S
bec7762c 40c5b020 a3a00019 00000000 4082c238 ..#........8..#
bec7763c 40085a98 00000022 40103033 40cdbb10 .Z.#"...30.#...#
memory near sp:
bec76d90 0000000e bec77310 c0000000 00000108 .....s..........
bec76da0 00000000 003ef75c df0027ad 00000000 ....\.>..'......
bec76db0 524af370 53dc0677 00000000 53dc0b15 p.JRw..S.......S
bec76dc0 00000000 00000108 524af160 003ef75c ........`.JR\.>.
bec76dd0 00000164 bec77608 48ce1c44 40c5b020 d....v..D..H ..#
code around pc:
40049794 0240f3c0 66a8f8df f102fa30 0c02eb03 ..#....f0.......
400497a4 0501eb0c eb06447e 25000085 312cf8d0 ....~D.....%..,1
400497b4 685ae00d f0226919 ebc40c03 4542020c ..Zh.i".......BE
400497c4 4642bf2c b901461d 460b6959 2b004690 ,.BF.F..Yi.F.F.+
400497d4 2d00d1ef 818ff000 2668f8df 6890447a ...-......h&zD.h
code around lr:
40049194 b930fd11 2becf8df f8d2447a 078b11b4 ..0....+zD......
400491a4 f8dfd50a 447d5be4 70dcf505 f7fe2500 .....[}D...p.%..
400491b4 2800e886 8249f041 f2002cf4 2c0a823f ...(A.I..,..?..,
400491c4 340bd903 0407f024 2410e000 7bbcf8df ...4$......$...{
400491d4 447f08e2 fa36683e 079df302 f003d042 ...D>h6.....B...
pid: 31725, tid: 31727, name: GC
r0 fffffffc r1 00000080 r2 fffffffc r3 4fe62e30
r4 40cdbbb0 r5 40cdbbac r6 fffffffc r7 000000f0
r8 00001388 r9 00000000 sl 4082df98 fp 00000001
ip 00000000 sp 4fe62e10 lr 40047f80 pc 40042ca4 cpsr 60000010
d0 42c80000428cea01 d1 3ff00000003db190
d2 0000000100000001 d3 b684088000080000
d4 0000000040dc8000 d5 000000000006e400
d6 00578fe000000963 d7 000000464dc0cae2
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 4139200000000000 d17 4132d9f000000000
d18 0033003200310030 d19 0000000000000000
d20 4008000000000000 d21 3fbc71c71c71c71c
d22 3fcc7288e957b53b d23 3fd24998d6307188
d24 3fd99a27ad32ddf5 d25 3fe555b0aaeac752
d26 0000000000000000 d27 0000000000000000
d28 0000000000000005 d29 0000000000000000
d30 0000000000000000 d31 0000000000000000
scr 80000010
backtrace:
#00 pc 0000dca4 /system/lib/libc.so (__futex_syscall3+12)
#01 pc 00012f7c /system/lib/libc.so (__pthread_cond_timedwait_relative+48)
#02 pc 00012fd8 /system/lib/libc.so (__pthread_cond_timedwait+60)
#03 pc 00057029 /system/lib/libdvm.so (dvmRelativeCondWait(pthread_cond_t*, pthread_mutex_t*, long long, int)+112)
#04 pc 00078655 /system/lib/libdvm.so
#05 pc 000591e7 /system/lib/libdvm.so
#06 pc 00012e48 /system/lib/libc.so (__thread_entry+72)
#07 pc 0001257c /system/lib/libc.so (pthread_create+208)
stack:
4fe62dd0 01e9b4a6
4fe62dd4 7fffffff
4fe62dd8 01e9b50c
4fe62ddc 0004e200
4fe62de0 0000fa00
4fe62de4 40046314 /system/lib/libc.so (__divdi3+244)
4fe62de8 01e9b517
4fe62dec 4082c238 /system/lib/libdvm.so
4fe62df0 40cdbab0 [heap]
4fe62df4 00000000
4fe62df8 4fe62e00
4fe62dfc 000003e8
4fe62e00 00000000
4fe62e04 00001388
4fe62e08 00000000
4fe62e0c 00001388
#00 4fe62e10 40cdbbb0 [heap]
4fe62e14 4fe62e30
#01 4fe62e18 00000001
4fe62e1c 40cdbbac [heap]
4fe62e20 40cdbbb0 [heap]
4fe62e24 40cdbbb0 [heap]
4fe62e28 40cdbbac [heap]
4fe62e2c 40047fdc /system/lib/libc.so (__pthread_cond_timedwait+64)
#02 4fe62e30 00000004
4fe62e34 3b9ac618
4fe62e38 4fe62e40
4fe62e3c 1c09ac61
4fe62e40 00007d62
4fe62e44 407ca02d /system/lib/libdvm.so (dvmRelativeCondWait(pthread_cond_t*, pthread_mutex_t*, long long, int)+116)
#03 4fe62e48 00007d62
4fe62e4c 1c09ac61
4fe62e50 00001388
4fe62e54 407eb765 /system/lib/libdvm.so
4fe62e58 4082df98
4fe62e5c 00000000
4fe62e60 00000001
4fe62e64 407cc19d /system/lib/libdvm.so
4fe62e68 00100000
4fe62e6c 407eb659 /system/lib/libdvm.so
#04 4fe62e70 00000000
4fe62e74 00000001
4fe62e78 00000001
4fe62e7c 00000000
4fe62e80 00000008
4fe62e84 40c725e0
4fe62e88 4082c238 /system/lib/libdvm.so
4fe62e8c bec77768 [stack]
4fe62e90 00000078
4fe62e94 407cc19d /system/lib/libdvm.so
4fe62e98 00100000
4fe62e9c 40c725e0
4fe62ea0 00000001
4fe62ea4 407cc1e9 /system/lib/libdvm.so
#05 4fe62ea8 40c725e0
4fe62eac 00010002
4fe62eb0 40ccbc80
4fe62eb4 40cea080 /dev/ashmem/dalvik-heap (deleted)
4fe62eb8 4fe62f00
4fe62ebc 40c725e0
4fe62ec0 407cc190 /system/lib/libdvm.so (dvmDetachCurrentThread()+763)
4fe62ec4 40047e4c /system/lib/libc.so (__thread_entry+76)
#06 4fe62ec8 00000000
4fe62ecc 00000000
4fe62ed0 00000000
4fe62ed4 00000000
4fe62ed8 00000000
4fe62edc 4fe62f00
4fe62ee0 40cce0a0
4fe62ee4 bec77770 [stack]
4fe62ee8 00000078
4fe62eec 407cc19d /system/lib/libdvm.so
4fe62ef0 00100000
4fe62ef4 40c725e0
4fe62ef8 00000001
4fe62efc 40047580 /system/lib/libc.so (pthread_create+212)
#07 4fe62f00 4fe62f00
4fe62f04 40cce0a0
4fe62f08 00000000
4fe62f0c 00000000
4fe62f10 00000000
4fe62f14 00000000
4fe62f18 4e68a460
4fe62f1c 00000000
4fe62f20 00000000
4fe62f24 00000000
4fe62f28 00000000
4fe62f2c 00000000
4fe62f30 00000000
4fe62f34 00000000
4fe62f38 00000000
4fe62f3c 00000000
pid: 31725, tid: 31729, name: Signal Catcher
r0 fffffffc r1 00000000 r2 00000000 r3 00000008
r4 4ff62e58 r5 40828261 r6 bec77778 r7 000000b1
r8 407cc19d r9 52415800 sl 5010be38 fp 00042e74
ip 40827e6c sp 4ff62e18 lr 4004f453 pc 40042554 cpsr 20000010
d0 42c800004266db5b d1 3ff00000002aff38
d2 0000000100000001 d3 b684088000080000
d4 0000000040dc8000 d5 000000000006e400
d6 004a7ff000000963 d7 000000394d865d8f
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 40d3000000000000 d17 40c3cc0000000000
d18 0033003200310030 d19 0000000000000000
d20 4008000000000000 d21 3fbc71c71c71c71c
d22 3fcc7288e957b53b d23 3fd24998d6307188
d24 3fd99a27ad32ddf5 d25 3fe555b0aaeac752
d26 0000000000000000 d27 0000000000000000
d28 0000000000000005 d29 0000000000000000
d30 0000000000000000 d31 0000000000000000
scr 80000010
backtrace:
#00 pc 0000d554 /system/lib/libc.so (__rt_sigtimedwait+12)
#01 pc 0001a44f /system/lib/libc.so (sigwait+20)
#02 pc 00055fcf /system/lib/libdvm.so
#03 pc 000591e7 /system/lib/libdvm.so
#04 pc 00012e48 /system/lib/libc.so (__thread_entry+72)
#05 pc 0001257c /system/lib/libc.so (pthread_create+208)
stack:
4ff62dd8 00000000
4ff62ddc 00000000
4ff62de0 00000000
4ff62de4 00000000
4ff62de8 00000000
4ff62dec 00000000
4ff62df0 40827c88 /system/lib/libdvm.so
4ff62df4 52415800
4ff62df8 4bc64570 /dev/ashmem/dalvik-LinearAlloc (deleted)
4ff62dfc 4ff62e78
4ff62e00 4ff62e78
4ff62e04 40cbffc4
4ff62e08 4ce76760 /system/framework/core.odex
4ff62e0c 4ff62e78
4ff62e10 00000000
4ff62e14 407d9c21 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+276)
#00 4ff62e18 4ff62e58
4ff62e1c 40811cfc /system/lib/libdvm.so
#01 4ff62e20 00000204
4ff62e24 00000000
4ff62e28 5010be38
4ff62e2c 407c8fd3 /system/lib/libdvm.so
#02 4ff62e30 00000001
4ff62e34 40cea080 /dev/ashmem/dalvik-heap (deleted)
4ff62e38 4bc64570 /dev/ashmem/dalvik-LinearAlloc (deleted)
4ff62e3c 40003310
4ff62e40 52415b6c
4ff62e44 407c88ef /system/lib/libdvm.so (dvmRemoveFromReferenceTable(ReferenceTable*, Object**, Object*)+30)
4ff62e48 52415800
4ff62e4c 00042e8a
4ff62e50 410a0ec8 /dev/ashmem/dalvik-heap (deleted)
4ff62e54 00000204
4ff62e58 ffffffe0
4ff62e5c 52415800
4ff62e60 410a0ec8 /dev/ashmem/dalvik-heap (deleted)
4ff62e64 407cb485 /system/lib/libdvm.so (dvmAttachCurrentThread(JavaVMAttachArgs const*, bool)+452)
4ff62e68 40cea080 /dev/ashmem/dalvik-heap (deleted)
4ff62e6c 410a0ec8 /dev/ashmem/dalvik-heap (deleted)
........ ........
#03 4ff62ea8 5010be38
4ff62eac 00010002
4ff62eb0 40c6d380
4ff62eb4 40cea080 /dev/ashmem/dalvik-heap (deleted)
4ff62eb8 4ff62f00
4ff62ebc 5010be38
4ff62ec0 407cc190 /system/lib/libdvm.so (dvmDetachCurrentThread()+763)
4ff62ec4 40047e4c /system/lib/libc.so (__thread_entry+76)
#04 4ff62ec8 00000000
4ff62ecc 00000000
4ff62ed0 00000000
4ff62ed4 00000000
4ff62ed8 00000000
4ff62edc 4ff62f00
4ff62ee0 40cce8f8
4ff62ee4 bec77780 [stack]
4ff62ee8 00000078
4ff62eec 407cc19d /system/lib/libdvm.so
4ff62ef0 00100000
4ff62ef4 5010be38
4ff62ef8 00000001
4ff62efc 40047580 /system/lib/libc.so (pthread_create+212)
#05 4ff62f00 4ff62f00
4ff62f04 40cce8f8
4ff62f08 00000000
4ff62f0c 00000000
4ff62f10 00000000
4ff62f14 00000000
4ff62f18 52415800
4ff62f1c 00000000
4ff62f20 00000000
4ff62f24 00000000
4ff62f28 00000000
4ff62f2c 00000000
4ff62f30 00000000
4ff62f34 00000000
4ff62f38 00000000
4ff62f3c 00000000
pid: 31725, tid: 31730, name: JDWP
r0 00000031 r1 50062de0 r2 00000000 r3 00000000
r4 00000000 r5 00000000 r6 00000000 r7 0000008e
r8 501011b0 r9 00000030 sl 0003b777 fp 00000001
ip 50062dc0 sp 50062db0 lr 407dad43 pc 40041cb4 cpsr 40000010
d0 42c800004266db5b d1 3ff00000002aff38
d2 0000000100000001 d3 b684088000080000
d4 0000000040dc8000 d5 000000000006e400
d6 004a7ff000000963 d7 000000394d865d8f
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 40d3000000000000 d17 40c3cc0000000000
d18 0033003200310030 d19 0000000000000000
d20 4008000000000000 d21 3fbc71c71c71c71c
d22 3fcc7288e957b53b d23 3fd24998d6307188
d24 3fd99a27ad32ddf5 d25 3fe555b0aaeac752
d26 0000000000000000 d27 0000000000000000
d28 0000000000000005 d29 0000000000000000
d30 0000000000000000 d31 0000000000000000
scr 80000010
backtrace:
#00 pc 0000ccb4 /system/lib/libc.so (select+16)
#01 pc 00067d3f /system/lib/libdvm.so
#02 pc 0006acd1 /system/lib/libdvm.so
#03 pc 000591e7 /system/lib/libdvm.so
#04 pc 00012e48 /system/lib/libc.so (__thread_entry+72)
#05 pc 0001257c /system/lib/libc.so (pthread_create+208)
[1] Should I call System.GC() explicitly? As many have different
opinions on calling this ourselves, and some say this is not a good
practice.
Probably not. As previously mentioned by user3580294, System.GC() is really only a suggestion to the VM and what it does when you call that method directly is totally up to the implementation. I would never use this function to prevent a program from crashing.
[2] How do I elegantly free the memory in the loop to avoid crash?
What exactly is using up all the memory? Clearly when MyClass is
constructed some native resouces are being created... Are these JNI
objects? Are they C alloced memory?
I am going to go out on a limb here based on the backtrace and say that the objects eating up all your memory are JNI objects that were created in C/C++ (probably on a separate thread) and passed back to the JVM. Try calling DeleteLocalRef() on the JNI object(s) that are passed back to the VM.
Again, my above suggestion is based on a lot of assumption. You really need to attach a memory profiler like jvisualvm to the JVM to see exactly what is using up all the memory and then determine why the GC didn't catch it. (Hint: there is probably still a reference to it)

Android: JNI crash

i'm developing android app that uses Clang via C API (libclang) for ARM.
I've wrote wrapper to invoke clang_..() functions and map data between Java<->native code. So the app is working for few times and then crashing. It's interacting with native code from java background thread (if that helps).
My idea about what's wrong is:
i'm trying to delete already deleted pointer
there is a memory leak in my code/clang and heap is fully allocated
concurrency issue
Any thoughts are highly appreciated:
12-10 23:03:55.382: ASSERT/libc(2763): Fatal signal 11 (SIGSEGV) at 0x00000acb (code=0), thread 3690 (Thread-545)
// ...
12-10 23:03:55.883: INFO/DEBUG(167): backtrace:
12-10 23:03:55.883: INFO/DEBUG(167): #00 pc 0017b198 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::cxdiag::lazyCreateDiags(CXTranslationUnitImpl*, bool)+200)
12-10 23:03:55.883: INFO/DEBUG(167): #01 pc 00009028 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang_wrapper.so (Java_name_antonsmirnov_clang_clang_1wrapper_getDiagnostics+72)
12-10 23:03:55.883: INFO/DEBUG(167): #02 pc 0001fb70 /system/lib/libdvm.so (dvmPlatformInvoke+112)
12-10 23:03:55.883: INFO/DEBUG(167): #03 pc 0004e8b9 /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+360)
12-10 23:03:55.883: INFO/DEBUG(167): #04 pc 00029020 /system/lib/libdvm.so
12-10 23:03:55.883: INFO/DEBUG(167): #05 pc 0002d7e8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+180)
12-10 23:03:55.883: INFO/DEBUG(167): #06 pc 0005fed5 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+272)
12-10 23:03:55.883: INFO/DEBUG(167): #07 pc 0005feff /system/lib/libdvm.so (dvmCallMethod(Thread*, Method const*, Object*, JValue*, ...)+20)
12-10 23:03:55.883: INFO/DEBUG(167): #08 pc 00055327 /system/lib/libdvm.so
12-10 23:03:55.883: INFO/DEBUG(167): #09 pc 00012e70 /system/lib/libc.so (__thread_entry+48)
12-10 23:03:55.883: INFO/DEBUG(167): #10 pc 000125c8 /system/lib/libc.so (pthread_create+172)
12-10 23:03:55.883: INFO/DEBUG(167): stack:
12-10 23:03:55.883: INFO/DEBUG(167): 76475be0 00000004
12-10 23:03:55.883: INFO/DEBUG(167): 76475be4 1d300005
12-10 23:03:55.883: INFO/DEBUG(167): 76475be8 76475c04 [stack:3690]
12-10 23:03:55.883: INFO/DEBUG(167): 76475bec 735086e0
12-10 23:03:55.883: INFO/DEBUG(167): 76475bf0 731a51c8
12-10 23:03:55.883: INFO/DEBUG(167): 76475bf4 00000000
12-10 23:03:55.883: INFO/DEBUG(167): 76475bf8 731a3f48
12-10 23:03:55.883: INFO/DEBUG(167): 76475bfc 76475c80 [stack:3690]
12-10 23:03:55.883: INFO/DEBUG(167): 76475c00 7373df30
12-10 23:03:55.883: INFO/DEBUG(167): 76475c04 7160ca88
12-10 23:03:55.883: INFO/DEBUG(167): 76475c08 76475c7c [stack:3690]
12-10 23:03:55.883: INFO/DEBUG(167): 76475c0c 40137ff1 /system/lib/libc.so (malloc+12)
12-10 23:03:55.883: INFO/DEBUG(167): 76475c10 75fcda38 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so
12-10 23:03:55.883: INFO/DEBUG(167): 76475c14 402028ff /system/lib/libstdc++.so (operator new[](unsigned int)+6)
12-10 23:03:55.883: INFO/DEBUG(167): 76475c18 df0027ad
12-10 23:03:55.883: INFO/DEBUG(167): 76475c1c 00000000
12-10 23:03:55.883: INFO/DEBUG(167): #00 76475c20 1d300005
12-10 23:03:55.883: INFO/DEBUG(167): 76475c24 7308de78
12-10 23:03:55.883: INFO/DEBUG(167): 76475c28 76475c54 [stack:3690]
12-10 23:03:55.883: INFO/DEBUG(167): 76475c2c 715ebdb0 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang_wrapper.so (unmapTranslationUnit+56)
12-10 23:03:55.883: INFO/DEBUG(167): 76475c30 7308de78
12-10 23:03:55.883: INFO/DEBUG(167): 76475c34 715f1620 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang_wrapper.so
12-10 23:03:55.883: INFO/DEBUG(167): 76475c38 1d200005
12-10 23:03:55.883: INFO/DEBUG(167): 76475c3c 0008de78
12-10 23:03:55.883: INFO/DEBUG(167): 76475c40 1d300005
12-10 23:03:55.883: INFO/DEBUG(167): 76475c44 6da271c0 /dev/ashmem/dalvik-LinearAlloc (deleted)
12-10 23:03:55.883: INFO/DEBUG(167): 76475c48 7160ca78
12-10 23:03:55.883: INFO/DEBUG(167): 76475c4c 00000004
12-10 23:03:55.883: INFO/DEBUG(167): 76475c50 7373df38
12-10 23:03:55.883: INFO/DEBUG(167): 76475c54 715ef02c /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang_wrapper.so (Java_name_antonsmirnov_clang_clang_1wrapper_getDiagnostics+76)
12-10 23:03:55.883: INFO/DEBUG(167): #01 76475c58 6d707560 /dev/ashmem/dalvik-LinearAlloc (deleted)
12-10 23:03:55.883: INFO/DEBUG(167): 76475c5c 1d300005
12-10 23:03:55.883: INFO/DEBUG(167): 76475c60 1d300001
12-10 23:03:55.883: INFO/DEBUG(167): 76475c64 7308de78
12-10 23:03:55.883: INFO/DEBUG(167): 76475c68 42802618 /dev/ashmem/dalvik-heap (deleted)
12-10 23:03:55.883: INFO/DEBUG(167): 76475c6c 731a51c8
12-10 23:03:55.883: INFO/DEBUG(167): 76475c70 7160ca78
12-10 23:03:55.883: INFO/DEBUG(167): 76475c74 7160cb20
12-10 23:03:55.883: INFO/DEBUG(167): 76475c78 76475c94 [stack:3690]
12-10 23:03:55.883: INFO/DEBUG(167): 76475c7c 41463b74 /system/lib/libdvm.so (dvmPlatformInvoke+116)
12-10 23:03:55.883: INFO/DEBUG(167): #02 76475c80 7373df2c
12-10 23:03:55.883: INFO/DEBUG(167): 76475c84 00000001
12-10 23:03:55.883: INFO/DEBUG(167): 76475c88 427fe0c8 /dev/ashmem/dalvik-heap (deleted)
12-10 23:03:55.883: INFO/DEBUG(167): 76475c8c 741b6c52 /data/dalvik-cache/data#app#name.antonsmirnov.android.arduinodroid-1.apk#classes.dex
12-10 23:03:55.883: INFO/DEBUG(167): 76475c90 00000000
12-10 23:03:55.883: INFO/DEBUG(167): 76475c94 414928bd /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+364)
12-10 23:03:55.893: INFO/DEBUG(167): memory near r0:
12-10 23:03:55.893: INFO/DEBUG(167): 76475c00 7373df30 7160ca88 76475c7c 40137ff1 0.ss..`q|\Gv...#
12-10 23:03:55.893: INFO/DEBUG(167): 76475c10 75fcda38 402028ff df0027ad 00000000 8..u.( #.'......
12-10 23:03:55.893: INFO/DEBUG(167): 76475c20 1d300005 7308de78 76475c54 715ebdb0 ..0.x..sT\Gv..^q
12-10 23:03:55.893: INFO/DEBUG(167): 76475c30 7308de78 715f1620 1d200005 0008de78 x..s ._q.. .x...
12-10 23:03:55.893: INFO/DEBUG(167): 76475c40 1d300005 6da271c0 7160ca78 00000004 ..0..q.mx.`q....
12-10 23:03:55.893: INFO/DEBUG(167): memory near r2:
12-10 23:03:55.893: INFO/DEBUG(167): 73265708 00000002 7326f158 72d26e70 7324d350 ....X.&spn.rP.$s
12-10 23:03:55.893: INFO/DEBUG(167): 73265718 0000006a 00000000 00000050 00000043 j.......P...C...
12-10 23:03:55.893: INFO/DEBUG(167): 73265728 00000001 401000f0 00000000 00000006 .......#........
12-10 23:03:55.893: INFO/DEBUG(167): 73265738 0000000a 0000000a 00000008 00000000 ................
12-10 23:03:55.893: INFO/DEBUG(167): 73265748 00000e60 749a3930 749a3930 00000000 `...09.t09.t....
12-10 23:03:55.893: INFO/DEBUG(167): memory near r4:
12-10 23:03:55.893: INFO/DEBUG(167): 735086c0 00790063 00750066 00760079 00000076 c.y.f.u.y.v.v...
12-10 23:03:55.893: INFO/DEBUG(167): 735086d0 006a0020 00670062 00000068 0000001b .j.b.g.h.......
12-10 23:03:55.893: INFO/DEBUG(167): 735086e0 75fcda38 00000000 00000000 00000000 8..u............
12-10 23:03:55.893: INFO/DEBUG(167): 735086f0 00000000 0000001b 00000001 00000001 ................
12-10 23:03:55.893: INFO/DEBUG(167): 73508700 72cfb378 00000000 00000018 000000bb x..r............
12-10 23:03:55.893: INFO/DEBUG(167): memory near r5:
12-10 23:03:55.893: INFO/DEBUG(167): 731a51a8 749a3930 749a3930 749a3930 00000000 09.t09.t09.t....
12-10 23:03:55.893: INFO/DEBUG(167): 731a51b8 00000000 00000000 00000000 00000023 ............#...
12-10 23:03:55.893: INFO/DEBUG(167): 731a51c8 715a1dc0 731a3f48 72dbafc0 735086e0 ..ZqH?.s...r..Ps
12-10 23:03:55.893: INFO/DEBUG(167): 731a51d8 73121220 00000000 00000000 0000001b ..s............
12-10 23:03:55.893: INFO/DEBUG(167): 731a51e8 00000005 00000005 00000000 6e616c63 ............clan
12-10 23:03:55.893: INFO/DEBUG(167): memory near r6:
12-10 23:03:55.893: INFO/DEBUG(167): 73265708 00000002 7326f158 72d26e70 7324d350 ....X.&spn.rP.$s
12-10 23:03:55.893: INFO/DEBUG(167): 73265718 0000006a 00000000 00000050 00000043 j.......P...C...
12-10 23:03:55.893: INFO/DEBUG(167): 73265728 00000001 401000f0 00000000 00000006 .......#........
12-10 23:03:55.893: INFO/DEBUG(167): 73265738 0000000a 0000000a 00000008 00000000 ................
12-10 23:03:55.893: INFO/DEBUG(167): 73265748 00000e60 749a3930 749a3930 00000000 `...09.t09.t....
12-10 23:03:55.893: INFO/DEBUG(167): memory near r7:
12-10 23:03:55.893: INFO/DEBUG(167): 731a3f28 00000001 00000001 70a57cd8 00000000 .........|.p....
12-10 23:03:55.893: INFO/DEBUG(167): 731a3f38 732657a8 70a32c28 00000020 000003b3 .W&s(,.p .......
12-10 23:03:55.893: INFO/DEBUG(167): 731a3f48 75fcdfc8 731225f0 72d8ddd8 733af500 ...u.%.s...r..:s
12-10 23:03:55.893: INFO/DEBUG(167): 731a3f58 715b2ac8 00000000 73043e00 73690600 .*[q.....>.s..is
12-10 23:03:55.893: INFO/DEBUG(167): 731a3f68 734d9f88 00000000 00000000 00000000 ..Ms............
12-10 23:03:55.893: INFO/DEBUG(167): memory near r8:
12-10 23:03:55.893: INFO/DEBUG(167): 76475c60 1d300001 7308de78 42802618 731a51c8 ..0.x..s.&.B.Q.s
12-10 23:03:55.893: INFO/DEBUG(167): 76475c70 7160ca78 7160cb20 76475c94 41463b74 x.`q .`q.\Gvt;FA
12-10 23:03:55.893: INFO/DEBUG(167): 76475c80 7373df2c 00000001 427fe0c8 741b6c52 ,.ss.......BRl.t
12-10 23:03:55.893: INFO/DEBUG(167): 76475c90 00000000 414928bd 7373df2c 741b6c50 .....(IA,.ssPl.t
12-10 23:03:55.893: INFO/DEBUG(167): 76475ca0 715eefe0 7160ca88 00000000 00000000 ..^q..`q........
12-10 23:03:55.893: INFO/DEBUG(167): memory near r9:
12-10 23:03:55.893: INFO/DEBUG(167): 7373df10 00000000 00000000 7373df48 7417562c ........H.ss,V.t
12-10 23:03:55.893: INFO/DEBUG(167): 7373df20 6da271c0 00000000 00000000 1d300001 .q.m..........0.
12-10 23:03:55.893: INFO/DEBUG(167): 7373df30 1d300005 7373df84 741750a8 6da26b58 ..0...ss.P.tXk.m
12-10 23:03:55.893: INFO/DEBUG(167): 7373df40 7417562c 00000000 6d707560 00000000 ,V.t....`upm....
12-10 23:03:55.893: INFO/DEBUG(167): 7373df50 00000000 00000000 00000006 1d200005 .............. .
12-10 23:03:55.893: INFO/DEBUG(167): memory near sl:
12-10 23:03:55.893: INFO/DEBUG(167): 7160ca68 00000002 00000000 00000010 00000453 ............S...
12-10 23:03:55.893: INFO/DEBUG(167): 7160ca78 74175628 7373df2c 6da26b58 70991000 (V.t,.ssXk.m...p
12-10 23:03:55.893: INFO/DEBUG(167): 7160ca88 427fded8 00000007 76475da8 00000000 ...B.....]Gv....
12-10 23:03:55.893: INFO/DEBUG(167): 7160ca98 76475ddc 00000010 00000000 41463d00 .]Gv.........=FA
12-10 23:03:55.893: INFO/DEBUG(167): 7160caa8 00000000 00000000 6ca88670 7373a300 ........p..l..ss
12-10 23:03:55.893: INFO/DEBUG(167): memory near fp:
12-10 23:03:55.893: INFO/DEBUG(167): 76475c5c 1d300005 1d300001 7308de78 42802618 ..0...0.x..s.&.B
12-10 23:03:55.893: INFO/DEBUG(167): 76475c6c 731a51c8 7160ca78 7160cb20 76475c94 .Q.sx.`q .`q.\Gv
12-10 23:03:55.893: INFO/DEBUG(167): 76475c7c 41463b74 7373df2c 00000001 427fe0c8 t;FA,.ss.......B
12-10 23:03:55.893: INFO/DEBUG(167): 76475c8c 741b6c52 00000000 414928bd 7373df2c Rl.t.....(IA,.ss
12-10 23:03:55.893: INFO/DEBUG(167): 76475c9c 741b6c50 715eefe0 7160ca88 00000000 Pl.t..^q..`q....
12-10 23:03:55.893: INFO/DEBUG(167): memory near sp:
12-10 23:03:55.893: INFO/DEBUG(167): 76475c00 7373df30 7160ca88 76475c7c 40137ff1 0.ss..`q|\Gv...#
12-10 23:03:55.893: INFO/DEBUG(167): 76475c10 75fcda38 402028ff df0027ad 00000000 8..u.( #.'......
12-10 23:03:55.893: INFO/DEBUG(167): 76475c20 1d300005 7308de78 76475c54 715ebdb0 ..0.x..sT\Gv..^q
12-10 23:03:55.893: INFO/DEBUG(167): 76475c30 7308de78 715f1620 1d200005 0008de78 x..s ._q.. .x...
12-10 23:03:55.893: INFO/DEBUG(167): 76475c40 1d300005 6da271c0 7160ca78 00000004 ..0..q.mx.`q....
12-10 23:03:55.893: INFO/DEBUG(167): code around pc:
12-10 23:03:55.893: INFO/DEBUG(167): 7537b178 ebff8235 e3560000 15963000 e1a0000d 5.....V..0......
12-10 23:03:55.893: INFO/DEBUG(167): 7537b188 e1a02006 12833001 15863000 e5973020 . ...0...0.. 0..
12-10 23:03:55.893: INFO/DEBUG(167): 7537b198 e5931408 eb0152d7 e59f305c e58d4018 .....R..\0...#..
12-10 23:03:55.893: INFO/DEBUG(167): 7537b1a8 e58d401c e08f3003 e2833008 e597412c .#...0...0..,A..
12-10 23:03:55.893: INFO/DEBUG(167): 7537b1b8 e58d3000 e5977130 ea000002 e1a01004 .0..0q..........
12-10 23:03:55.893: INFO/DEBUG(167): code around lr:
12-10 23:03:55.893: INFO/DEBUG(167): 7537b15c e8800048 e580600c e5c06010 e585000c H....`...`......
12-10 23:03:55.893: INFO/DEBUG(167): 7537b16c e3a00038 ebff779f e1a06000 ebff8235 8....w...`..5...
12-10 23:03:55.893: INFO/DEBUG(167): 7537b17c e3560000 15963000 e1a0000d e1a02006 ..V..0....... ..
12-10 23:03:55.893: INFO/DEBUG(167): 7537b18c 12833001 15863000 e5973020 e5931408 .0...0.. 0......
12-10 23:03:55.893: INFO/DEBUG(167): 7537b19c eb0152d7 e59f305c e58d4018 e58d401c .R..\0...#...#..
12-10 23:03:55.923: DEBUG/WifiStateMachine(539): ConnectedState{ what=131155 when=-4ms arg1=1 }
12-10 23:03:55.933: DEBUG/WifiStateMachine(539): L2ConnectedState{ what=131155 when=-4ms arg1=1 }
Another crash (probably another reason):
12-11 00:10:38.106: INFO/DEBUG(166): r0 00000027 r1 deadbaad r2 4024cb0c r3 00000000
12-11 00:10:38.106: INFO/DEBUG(166): r4 00000000 r5 7e7a82bc r6 00000002 r7 00000002
12-11 00:10:38.106: INFO/DEBUG(166): r8 00000030 r9 7d3c0590 sl 7d3aae24 fp 40253a6c
12-11 00:10:38.106: INFO/DEBUG(166): ip 00004000 sp 7e7a82b8 lr 4021ec89 pc 4021b32a cpsr 60000030
12-11 00:10:38.106: INFO/DEBUG(166): d0 20656c6966206e69 d1 646564756c636e69
12-11 00:10:38.106: INFO/DEBUG(166): d2 6f63206d6f726620 d3 645f6574656c706d
12-11 00:10:38.106: INFO/DEBUG(166): d4 000002db000002c9 d5 000002ed000002ec
12-11 00:10:38.106: INFO/DEBUG(166): d6 000003ae0000039c d7 000003d4000003c1
12-11 00:10:38.106: INFO/DEBUG(166): d8 4418800000000262 d9 4434000043898000
12-11 00:10:38.106: INFO/DEBUG(166): d10 0000000042c00000 d11 0000000000000000
12-11 00:10:38.106: INFO/DEBUG(166): d12 0000000000000000 d13 0000000000000000
12-11 00:10:38.106: INFO/DEBUG(166): d14 0000000000000000 d15 0000000000000000
12-11 00:10:38.106: INFO/DEBUG(166): d16 6769736e75202c2a d17 29746e692064656e
12-11 00:10:38.106: INFO/DEBUG(166): d18 6c63206e6f697461 d19 78654c3a3a676e61
12-11 00:10:38.106: INFO/DEBUG(166): d20 537465673a3a7265 d21 636f4c656372756f
12-11 00:10:38.106: INFO/DEBUG(166): d22 6863286e6f697461 d23 74736e6f63207261
12-11 00:10:38.106: INFO/DEBUG(166): d24 0000000000000000 d25 0000000000000000
12-11 00:10:38.106: INFO/DEBUG(166): d26 0000000000000000 d27 0000000000000000
12-11 00:10:38.106: INFO/DEBUG(166): d28 0048004700460044 d29 004a0048004a0049
12-11 00:10:38.106: INFO/DEBUG(166): d30 0000000000000000 d31 0000000000000000
12-11 00:10:38.106: INFO/DEBUG(166): scr 28000013
12-11 00:10:38.126: INFO/DEBUG(166): backtrace:
12-11 00:10:38.126: INFO/DEBUG(166): #00 pc 0001832a /system/lib/libc.so
12-11 00:10:38.126: INFO/DEBUG(166): #01 pc 0000dc04 /system/lib/libc.so (abort+4)
12-11 00:10:38.126: INFO/DEBUG(166): #02 pc 0001f0df /system/lib/libc.so (__assert2+30)
12-11 00:10:38.126: INFO/DEBUG(166): #03 pc 0077c954 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::getSourceLocation(char const*, unsigned int) const+76)
12-11 00:10:38.126: INFO/DEBUG(166): #04 pc 0077ca4c /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::FormTokenWithChars(clang::Token&, char const*, clang::tok::TokenKind)+100)
12-11 00:10:38.126: INFO/DEBUG(166): #05 pc 00781098 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::LexTokenInternal(clang::Token&)+5616)
12-11 00:10:38.126: INFO/DEBUG(166): #06 pc 0015de68 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::LexFromRawLexer(clang::Token&)+116)
12-11 00:10:38.126: INFO/DEBUG(166): #07 pc 00781d3c /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::getRawToken(clang::SourceLocation, clang::Token&, clang::SourceManager const&, clang::LangOptions const&)+220)
12-11 00:10:38.126: INFO/DEBUG(166): #08 pc 00781d9c /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::MeasureTokenLength(clang::SourceLocation, clang::SourceManager const&, clang::LangOptions const&)+36)
12-11 00:10:38.126: INFO/DEBUG(166): #09 pc 001d1824 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::DiagnosticRenderer::emitMacroExpansions(clang::SourceLocation, clang::DiagnosticsEngine::Level, llvm::ArrayRef<clang::CharSourceRange>, llvm::ArrayRef<clang::FixItHint>, clang::SourceManager const&, unsigned int&, unsigned int)+840)
12-11 00:10:38.126: INFO/DEBUG(166): #10 pc 001d13ec /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::DiagnosticRenderer::emitDiagnostic(clang::SourceLocation, clang::DiagnosticsEngine::Level, llvm::StringRef, llvm::ArrayRef<clang::CharSourceRange>, llvm::ArrayRef<clang::FixItHint>, clang::SourceManager const*, llvm::PointerUnion<clang::Diagnostic const*, clang::StoredDiagnostic const*>)+1224)
12-11 00:10:38.126: INFO/DEBUG(166): #11 pc 001d1b20 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::DiagnosticRenderer::emitStoredDiagnostic(clang::StoredDiagnostic&)+304)
12-11 00:10:38.126: INFO/DEBUG(166): #12 pc 0017b1c8 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::cxdiag::lazyCreateDiags(CXTranslationUnitImpl*, bool)+248)
12-11 00:10:38.126: INFO/DEBUG(166): #13 pc 00009028 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang_wrapper.so (Java_name_antonsmirnov_clang_clang_1wrapper_getDiagnostics+72)
12-11 00:10:38.126: INFO/DEBUG(166): #14 pc 0001fb70 /system/lib/libdvm.so (dvmPlatformInvoke+112)
12-11 00:10:38.126: INFO/DEBUG(166): #15 pc 0004e8b9 /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+360)
12-11 00:10:38.126: INFO/DEBUG(166): #16 pc 00029020 /system/lib/libdvm.so
12-11 00:10:38.126: INFO/DEBUG(166): #17 pc 0002d7e8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+180)
12-11 00:10:38.126: INFO/DEBUG(166): #18 pc 0005fed5 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+272)
12-11 00:10:38.126: INFO/DEBUG(166): #19 pc 0005feff /system/lib/libdvm.so (dvmCallMethod(Thread*, Method const*, Object*, JValue*, ...)+20)
12-11 00:10:38.126: INFO/DEBUG(166): #20 pc 00055327 /system/lib/libdvm.so
12-11 00:10:38.126: INFO/DEBUG(166): #21 pc 00012e70 /system/lib/libc.so (__thread_entry+48)
12-11 00:10:38.126: INFO/DEBUG(166): #22 pc 000125c8 /system/lib/libc.so (pthread_create+172)
12-11 00:10:38.126: INFO/DEBUG(166): stack:
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a8278 00000000
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a827c c6c488f5
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a8280 00001000
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a8284 00000262
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a8288 44188000 /dev/ashmem/dalvik-heap (deleted)
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a828c 43898000 /dev/ashmem/dalvik-heap (deleted)
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a8290 40247774 /system/lib/libc.so
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a8294 4024cd10
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a8298 00000000
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a829c 4021ec89 /system/lib/libc.so (_fwalk+32)
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82a0 00000001
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82a4 7e7a82bc [stack:5011]
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82a8 00000002
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82ac 00000002
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82b0 df0027ad
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82b4 00000000
12-11 00:10:38.126: INFO/DEBUG(166): #00 7e7a82b8 75ff7ec2 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82bc fffffbdf
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82c0 4023dbfc /system/lib/libc.so
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82c4 00000002
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82c8 00000002
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82cc 4021e1f5 /system/lib/libc.so (fprintf+16)
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82d0 40247718 /system/lib/libc.so
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82d4 75ff7ec2 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82d8 4023dbfc /system/lib/libc.so
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82dc 40210c08 /system/lib/libc.so (__pthread_clone)
12-11 00:10:38.126: INFO/DEBUG(166): #01 7e7a82e0 7e7a82e0 [stack:5011]
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82e4 402220e3 /system/lib/libc.so (__assert2+34)
12-11 00:10:38.126: INFO/DEBUG(166): #02 7e7a82e8 0000042d
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82ec 75feace7 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::getSourceLocation(char const*, unsigned int) const::__PRETTY_FUNCTION__)
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82f0 75feace7 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::getSourceLocation(char const*, unsigned int) const::__PRETTY_FUNCTION__)
12-11 00:10:38.126: INFO/DEBUG(166): 7e7a82f4 75a7c958 /data/data/name.antonsmirnov.android.arduinodroid/lib/libclang.so (clang::Lexer::getSourceLocation(char const*, unsigned int) const+80)
12-11 00:10:38.136: INFO/DEBUG(166): memory near r2:
12-11 00:10:38.136: INFO/DEBUG(166): 4024caec 00000000 00000000 00000000 00000000 ................
12-11 00:10:38.136: INFO/DEBUG(166): 4024cafc 00000000 00000000 00000000 00000000 ................
12-11 00:10:38.136: INFO/DEBUG(166): 4024cb0c 00000001 00000000 00000000 00000000 ................
12-11 00:10:38.136: INFO/DEBUG(166): 4024cb1c 00000000 00000000 00000000 00000000 ................
12-11 00:10:38.136: INFO/DEBUG(166): 4024cb2c 00000000 00000000 00000000 00000000 ................
12-11 00:10:38.136: INFO/DEBUG(166): memory near r5:
12-11 00:10:38.136: INFO/DEBUG(166): 7e7a829c 4021ec89 00000001 7e7a82bc 00000002 ..!#......z~....
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a82ac 00000002 df0027ad 00000000 75ff7ec2 .....'.......~.u
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a82bc fffffbdf 4023dbfc 00000002 00000002 ......##........
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a82cc 4021e1f5 40247718 75ff7ec2 4023dbfc ..!#.w$#.~.u..##
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a82dc 40210c08 7e7a82e0 402220e3 0000042d ..!#..z~. "#-...
12-11 00:10:38.146: INFO/DEBUG(166): memory near r9:
12-11 00:10:38.146: INFO/DEBUG(166): 7d3c0570 7d39c9fc 7e020006 0003be14 00000001 ..9}...~........
12-11 00:10:38.146: INFO/DEBUG(166): 7d3c0580 00000000 7e020015 0003be15 00000004 .......~........
12-11 00:10:38.146: INFO/DEBUG(166): 7d3c0590 7e313d3c 7e000069 0003be19 00000001 <=1~i..~........
12-11 00:10:38.146: INFO/DEBUG(166): 7d3c05a0 00000000 7e000016 0003be1e 0000000d .......~........
12-11 00:10:38.146: INFO/DEBUG(166): 7d3c05b0 7e1cbd10 7e0200a6 00000000 00000002 ...~...~........
12-11 00:10:38.146: INFO/DEBUG(166): memory near sl:
12-11 00:10:38.146: INFO/DEBUG(166): 7d3aae04 7d3aae24 7d3aaf15 706d6f63 6574656c $.:}..:}complete
12-11 00:10:38.146: INFO/DEBUG(166): 7d3aae14 6d65645f 6e692e6f 70632e6f 67670070 _demo.ino.cpp.gg
12-11 00:10:38.146: INFO/DEBUG(166): 7d3aae24 636e6923 6564756c 72413c20 6e697564 #include <Arduin
12-11 00:10:38.146: INFO/DEBUG(166): 7d3aae34 3e682e6f 7274730a 20746375 0a7b2073 o.h>.struct s {.
12-11 00:10:38.146: INFO/DEBUG(166): 7d3aae44 6e692020 3b692074 746e690a 203b6620 int i;.int f;
12-11 00:10:38.146: INFO/DEBUG(166): memory near fp:
12-11 00:10:38.146: INFO/DEBUG(166): 40253a4c 00000000 00000000 00000000 00000000 ................
12-11 00:10:38.146: INFO/DEBUG(166): 40253a5c 00000000 00000000 00000000 00000000 ................
12-11 00:10:38.146: INFO/DEBUG(166): 40253a6c c6c488f5 00000000 00000000 00000000 ................
12-11 00:10:38.146: INFO/DEBUG(166): 40253a7c 00000000 00000000 00000000 00000000 ................
12-11 00:10:38.146: INFO/DEBUG(166): 40253a8c 00000000 00000000 00000000 00000000 ................
12-11 00:10:38.146: INFO/DEBUG(166): memory near ip:
12-11 00:10:38.146: INFO/DEBUG(166): 00003fe0 ffffffff ffffffff ffffffff ffffffff ................
12-11 00:10:38.146: INFO/DEBUG(166): 00003ff0 ffffffff ffffffff ffffffff ffffffff ................
12-11 00:10:38.146: INFO/DEBUG(166): 00004000 ffffffff ffffffff ffffffff ffffffff ................
12-11 00:10:38.146: INFO/DEBUG(166): 00004010 ffffffff ffffffff ffffffff ffffffff ................
12-11 00:10:38.146: INFO/DEBUG(166): 00004020 ffffffff ffffffff ffffffff ffffffff ................
12-11 00:10:38.146: INFO/DEBUG(166): memory near sp:
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a8298 00000000 4021ec89 00000001 7e7a82bc ......!#......z~
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a82a8 00000002 00000002 df0027ad 00000000 .........'......
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a82b8 75ff7ec2 fffffbdf 4023dbfc 00000002 .~.u......##....
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a82c8 00000002 4021e1f5 40247718 75ff7ec2 ......!#.w$#.~.u
12-11 00:10:38.146: INFO/DEBUG(166): 7e7a82d8 4023dbfc 40210c08 7e7a82e0 402220e3 ..##..!#..z~. "#
12-11 00:10:38.146: INFO/DEBUG(166): code around pc:
12-11 00:10:38.146: INFO/DEBUG(166): 4021b308 e000b164 6823461c d1fb2b00 68e3e026 d....F#h.+..&..h
12-11 00:10:38.146: INFO/DEBUG(166): 4021b318 4a17b123 447a2401 47986014 20274911 #..J.$zD.`.G.I'
12-11 00:10:38.146: INFO/DEBUG(166): 4021b328 70082400 eb9cf7f4 f7f52106 a902ecdc .$.p.....!......
12-11 00:10:38.146: INFO/DEBUG(166): 4021b338 f04f2006 460a5380 94029304 f7f59403 . O..S.F........
12-11 00:10:38.146: INFO/DEBUG(166): 4021b348 4629e8ba 20024622 e8c2f7f5 eb88f7f4 ..)F"F. ........
12-11 00:10:38.146: INFO/DEBUG(166): code around lr:
12-11 00:10:38.146: INFO/DEBUG(166): 4021ec68 41f0e92d 4c0b2600 447c4680 68a56824 -..A.&.L.F|D$h.h
12-11 00:10:38.146: INFO/DEBUG(166): 4021ec78 e0076867 300cf9b5 dd022b00 47c04628 gh.....0.+..(F.G
12-11 00:10:38.146: INFO/DEBUG(166): 4021ec88 35544306 d5f53f01 2c006824 4630d1ef .CT5.?..$h.,..0F
12-11 00:10:38.146: INFO/DEBUG(166): 4021ec98 81f0e8bd 0002888e 43f0e92d fb01461f ........-..C.F..
12-11 00:10:38.146: INFO/DEBUG(166): 4021eca8 f8dff602 b0878058 44f8460c 8000f8d8 ....X....F.D....
12-11 00:10:38.146: INFO/DEBUG(166): memory map around fault addr deadbaad:
12-11 00:10:38.146: INFO/DEBUG(166): be8ef000-be910000 [stack]
12-11 00:10:38.146: INFO/DEBUG(166): (no map for address)
12-11 00:10:38.146: INFO/DEBUG(166): ffff0000-ffff1000 [vectors]
12-11 00:10:38.536: INFO/BootReceiver
It was concurrency issue. Clang methods/structures seem to be not thread-safe so one have to synchronize access. One more suggestion: do not share the same JNIEnv* between threads! use vm>GetEnv() from within a thread to get JNIEnv pointer.

Categories